lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20040914190229.18482.qmail@www.securityfocus.com> Date: 14 Sep 2004 19:02:29 -0000 From: "Jérôme" ATHIAS <jerome.athias@...amail.com> To: bugtraq@...urityfocus.com Subject: Buffer Overrun in JPEG Processing (GDI+) Could Allow Code Execution [MS04-028] A buffer overrun vulnerability exists in the processing of JPEG image formats that could allow remote code execution on an affected system. Any program that processes JPEG images on the affected systems could be vulnerable to this attack, and any system that uses the affected programs or components could be vulnerable to this attack. An attacker who successfully exploited this vulnerability could take complete control of an affected system. CAN-2004-0200 http://www.microsoft.com/technet/security/Bulletin/MS04-028.mspx